Professional Documents
Culture Documents
Student’s Name
Institutional Affiliation
Instructor’s Name
Introduction
In today’s era, observing data privacy, confidentiality and accuracy have become daily
troubles. The structure of most databases of companies reveal the interconnectedness of the
network domains and this feature makes it easy for looping. These databases later become
accessible to almost anybody who could otherwise wish to customize information mainly
because of this idea of interconnectivity. In return this creates a bad attitude towards the
application of technology as any person is capable of gaining an access to one’s confidential data
at a little or no potential cost. Advancement by the aid of technology sustains us make our lives
affordable however it has a remarkable danger and the worst of it is the idea of cyberwarfare. In
some circumstances, normal web clients may have no information about cyberwarfare and
paying no attention to what they do in the event of digital assault casualty, so many people tend
to fail resisting cybercrimes around the world especially since the technology is enhancing at a
faster rate. Cyberwarfare is an illegal activity which causes harm to someone else by the support
of a computer system and a network (Nicholson, 2012). These crimes occur through sabotaging
privacy and confidentiality. Whenever there is loss of protected or private data, it favors an
approach to misconducts like cyber terrorism, espionage, hacking, copyright infringement and
spamming. The danger once dominated by the viruses and worms by irresponsible hackers is
now governed by new species of cybercriminals. The above tremendous trends in the rise of
cyberwarfare compels for enforcement of cyber security at the system to help isolate cybercrime.
References
Nicholson, A., Webber, S., Dyer, S., Patel, T., & Janicke, H. (2012). SCADA security in the